-
byteskeptical
anyone have a better recommendation for a hardware wallet other than the trezor?
-
mrus
ledger
-
gijoe
Hey guys, a newb here. Currently getting into Monero. Not expecting to gain a ton of $$ but would like to help out since it is FOSS.
-
gijoe
Been watching Mental Outlaws videos on Monero. He reccomends using
github.com/fireice-uk/xmr-stak/releases over the offcial software
getmonero.org it seems.
-
gijoe
What do you guys reccomend? Is the 1st one legit?
-
moneromooo
I do not think it's a trojan per se, but it's made by an asshole who's been trying to destroy monero for years. I do not recommend it.
-
moneromooo
AFAIK, at least some of his miners (maybe this one, not sure) lied about hash rate and connected to his site.
-
moneromooo
So I would trust that one only if you read the source and build it yourself, if you relaly want to use it.
-
moneromooo
On the other hand, xmrig is the most used miner, and having variety is good. Just... other variety wluld be much better.
-
moneromooo
getmonero.org stuff is good.
-
gijoe
hehe I appreciate you input. What do most people around here recommend?
-
sech1
Also, xmr-stak hasn't been update in over 2 years
-
moneromooo
I'd use xmrig, as I said.
-
moneromooo
Or p2pool actually.
-
gijoe
ahhh thank you. I can check out getmonero.org
-
moneromooo
Though you do need xmrig for that too.
-
sech1
the best is to download the GUI wallet and mine using p2pool (available from GUI wallet)
-
sech1
but xmrig will give you more hashrate
-
gijoe
yeah, p2pool seems to be the right fit for me. Because of my business I am consistently on the move and can't leave dedicated machine on 24/7
-
gijoe
Also, I would assume mining on a small VPS is not recommended due to high CPU usage and power. Plus I can imagine most VPS provider have policies against such a thing.....?
-
sech1
most VPS don't allow mining
-
sech1
but you can run monerod and p2pool nodes on a VPS
-
gijoe
I see, I assume they are low power/low resource options to mine on VPS + help strengthen monero security....?
-
sech1
They do strengthen Monero security if you run them
-
sech1
but don't mine on VPS itself, just run the nodes there
-
sech1
you can connect xmrig to your p2pool node
-
sech1
and run xmrig on your PCs
-
gijoe
Ahhhh I see. This is getting interesting
-
XMRpeasant
Hey I have some Q about running nodes. Came from BTC / Lightning to XMR, got sold on the concept. Now I am all in XMR. I had some nodes out there in the BTC ecosystem to contribute. Re-puporsed them to XMR now and I think I didn't do a good job. There are conflicting stories out there about some of the settings. What I am observing is:
-
XMRpeasant
1) 2022-05-06 03:49:52.847 W There were 9 blocks in the last 60 minutes, there might be large hash rate changes, or we might be partitioned, cut off from the Monero network or under attack, or your computer's time is off. Or it could be just sheer bad luck.
-
XMRpeasant
Sometimes it was 30 blocks in 12 minutes or something too fast. Now its like this. Am I talking to fake peers and getting bullshit ?
-
rbrunner
You can do a quick check with a block explorer. If you also see there some unusual blocktimes your daemon is just warning you just in case
-
XMRpeasant
System clock is accurate. I think it ties into my other question... Some tutorials say we should pull a blocklist of bullshit nodes off github, other tutorials say use a directive to grab it via DNS, others say "Leave it alone it is no longer needed"
-
rbrunner
As far as I know the code is now so robust that it deals reasonably with those lying nodes without a need of an explicte blacklist
-
XMRpeasant
To do a test I stood up 3 nodes and added their .onion to each other and I also added sethforprivacy's two nodes .onion with add-peer and add-priority node and I observe tons of weirdness with the Tor bits
-
XMRpeasant
I constantly get "Unable to send transaction(s) to tor - no suitable outbound connections at height XYZ" even though I have a bunch of Tor peers connected.
-
XMRpeasant
Then it blacklists some nodes that "should" be legit, like sethforprivacy
-
XMRpeasant
2022-04-26 17:19:31.386 I Host sfpp2p7wnfjv3lrvfan4jmmkvhnbsbimpa3cqyuf7nt6zd24xhcqcsyd.onion unblocked.
-
XMRpeasant
2022-04-26 17:19:33.027 I Host sfpp2p2tlgpsjxygeknkkfq4ho5uco56zvp2whn7bz2v7xbyqoslofqd.onion unblocked.
-
XMRpeasant
2022-04-26 17:20:22.972 I Host sfpp2p7wnfjv3lrvfan4jmmkvhnbsbimpa3cqyuf7nt6zd24xhcqcsyd.onion blocked.
-
XMRpeasant
2022-04-26 17:21:15.654 W Unable to send transaction(s) to tor - no suitable outbound connections at height 2610502
-
XMRpeasant
When I check my node's Height it is the same I see on xmrchain and in my personal node on monero-gui so I think I can ignore those warnings but who knows lol. I want to support the ecosystem, not put nodes up that end up making us look bad. I think the Tor tx sending is especially troublesome when someone connects their wallet to my node and sends a transaction that ends up stuck
-
XMRpeasant
Are these config directives still a thing, and should be enabled:
-
XMRpeasant
enforce-dns-checkpointing and enable-dns-blocklist
-
XMRpeasant
and is it necessary to limit the number of Tor slots in tx-proxy=
-
XMRpeasant
I feel like I could just stop using tx-proxy altogether because I sufficiently shield users who connect via the node's .onion address and I do not care if it is known that the node itself has XMR involvement. It seems tx-proxy= is a bottleneck for my nodes
-
XMRpeasant
The docu says about enable-dns-blocklist "It is not recommended unless in emergency situations." But clearly I have some issues with my nodes blacklisting good nodes and freaking out
-
selsta
XMRpeasant: hashrate can fluctuate, seeing that message is nothing unusual
-
selsta
regarding tx-proxy, you can remove it if it causes issues
-
XMRpeasant
Cool so all I need to worry about then is tx-proxy "Unable to send transaction(s) to tor - no suitable outbound connections" and why the nodes are blacklisting good nodes
-
selsta
it seems to work fine for me when setting --add-priority-node but yes it's not perfect yet
-
XMRpeasant
I make my nodes p2p and RPC avaiable via clearnet and .onion. plenty of connections
-
XMRpeasant
and the nodes are connected to each other's .onion with
-
XMRpeasant
--add-priority-node
-
selsta
but yes, I'd remove it in your case
-
XMRpeasant
I thought this might fix the message about not having Tor connections, Node A would just tx to Node B
-
XMRpeasant
OK let me take it out
-
XMRpeasant
I still help people as they can connect their wallet via .onion and people can sync the chain via my .onions
-
XMRpeasant
I am doing 2 more nodes next weekend and want to get things right before I do. Not to inherit bad habits
-
XMRpeasant
so this ban-list off github. Is it still good practice or not ? I am banning sethforprivacy's .onion addresses - that cant be right LOL
-
selsta
add-priority-node=xwvz3ekocr3dkyxfkmgm2hvbpzx2ysqmaxgter7znnqrhoicygkfswid.onion:18083
-
selsta
that's what I have in my config with --tx-proxy
-
selsta
with a couple other .onion nodes
-
XMRpeasant
Yes my nodes have each other and 2 of seth's in there
-
XMRpeasant
but they ban seth and dont seem to use each other when theres a transaction.
-
selsta
ok, if you continue to have issues then remove tx-proxy
-
selsta
the bans have nothing to do with the ban list
-
selsta
the node can ban peers if they don't behave correctly, e.g. if they fail to reply correctly
-
XMRpeasant
I assumed the ban list is known fuckery and the automatic bans is when a node sends nonsense that doesnt match consensus ?
-
XMRpeasant
ah ok.. So the bans of these two might be Tor connectivity issues
-
selsta
it can have different reasons why a peer can get banned
-
XMRpeasant
I also manage 200Mbit/s of Tor nodes. I am starting to allow egress on 18080-18089 to help our cause
-
selsta
if you set log_level 2 it should say why, but that causes a lot of log spam
-
selsta
for now I'd just remove tx-proxy
-
XMRpeasant
yeah I tried that and my tiny brain exploded
-
XMRpeasant
haha tx-proxy gone and the .onion node you suggested is added now. lets see.
-
selsta
wait the .onion node doesn't make sense without tx-proxy
-
selsta
add-priority-node=snhurdf2egwjgdxchwgjrzehcfnruob2nqqqo7wzluukms55elf4kaqd.onion:18083
-
selsta
add-priority-node=4pixvbejrvihnkxmduo2agsnmc3rrulrqc7s3cbwwrep6h6hrzsibeqd.onion:18083
-
selsta
you can add all these 3 and together with tx-proxy and check if you continue to have issues
-
selsta
if yes remove tx-proxy and all onion priority nodes
-
selsta
hope that makes sense :D
-
XMRpeasant
oh I thought you can still maintain connections to .onion even if you dont use tx-proxy. If a node doesnt allow clearnet (behind CGNAT or something)
-
XMRpeasant
Yes perfectly clear. Thanks. I will try both
-
XMRpeasant
plenty of traffic so I think my nodes are helping sync
-
XMRpeasant
just the stuck tx are a user experience issue. I demo XMR to show the benefits and the tx is stuck during my demo... yikes :)
-
selsta
yes, I know that issue :P but I solved it after adding the priority nodes
-
selsta
one more thing, you should add `tx-proxy=tor,127.0.0.1:9050,disable_noise`
-
selsta
see the disable_noise option
-
XMRpeasant
ok so do not limit number of slots but do disable noise. got it
-
selsta
yes, that might also help with the message you saw and it will also mean that transactions show up instantly in the mempool
-
XMRpeasant
I only had 5 priority nodes, myself and sethforprivacy, maybe it wasnt enough to ensure something is available. Added the 3 you suggested now
-
selsta
I have 3 only
-
selsta
2 even
-
selsta
privacy wise it is from worst to best: clearnet -> tx_proxy with disable_noise -> tx_proxy
-
XMRpeasant
Last Q: The RPC port I have it on 18081 but I saw somewhere that theres a convention now to have public services on 10809. I have set restricted-rpc=1 there. But I want to play around with full RPC. Can I have a second section in the config and open an unrestricted RPC port on a wireguard IP or localhost only, and still offer public, restricted on another port ? Docu suggests it could work
-
XMRpeasant
I would want full RPC on 127.0.0.1:18081 and restricted on 0.0.0.0:18089, should work, right ?
-
selsta
--rpc-restricted-bind-ip, --rpc-restricted-bind-port, --rpc-bind-ip, --rpc-bind-port
-
selsta
it should work, yes
-
XMRpeasant
Awesome. I will play around with that.
-
XMRpeasant
Just happened again 2022-05-06 09:47:00.864 W Unable to send transaction(s) to tor - no suitable outbound connections at height 2617452
-
XMRpeasant
i will remove tx-proxy and prio nodes for now.
-
XMRpeasant
oh wait. I didnt restart after disable_noise.
-
selsta
yes, try with restart
-
selsta
I have also started --tx-proxy with disable noise and no priority nodes on one node now and I'm waiting to see if that message shows up
-
XMRpeasant
User experience is everything
-
XMRpeasant
how do wallets find nodes to use btw ? Is it all hardcoded or is it polling something like
monero.fail
-
selsta
the GUI currently uses a p2p node scanner that checks if nodes have --public-node but that will be replaced with a hardcoded list
-
selsta
too many issues with people setting up malicious nodes and spy nodes
-
selsta
other wallets also use a list of predefined nodes
-
selsta
CLI requires you to set your own node
-
XMRpeasant
Right. This is very similar to what we experience in Tor security. Same concept. Same fuckery.
-
XMRpeasant
This is why I also try put up XMR nodes in places OTHER THAN OVH/Hetzner/BuyVM - Those ASN have plenty of market share. We need ASN diversity and nodes in good hands to balance the crap
-
XMRpeasant
If IPv6-only were a thing I could stand up nodes on a dedicated ASN. I just dont have IPv4 /24s on hand that can be burned. And Tor still requires Ipv4. Can clearnet monerod be IPv6-only ?
-
XMRpeasant
No stuck transactions yet, tx-proxy on, no connection limit, disable_noise on. And a few priority nodes added. Looking better now! Thanks!
-
moneromooo
There are no IPV6 seed nodes, but I think it should work on IPv6 only if you give it a (non malicious) node manually on first start.
-
moneromooo
There is a --p2p-ignore-ipv4 to ignore error setting up ipv4, which implies it works without it.
-
moneromooo
In fact my seed node runs on both IPv4 and IPv6, I guess I could add its IPv6. I have no clue about IPv6 though, so I could not fix any network issue with it.
-
XMRpeasant
I am so happy to see no more stuff stuck. tx-proxy=tor,127.0.0.1:9050,disable_noise and a couple mroe priority nodes added seemed to make a huge difference. Nice!
-
selsta
XMRpeasant: from what I can tell `disable_noise` does the trick, the priority nodes aren't necessary but also don't hurt
-
XMRpeasant
selsta: 5 hours now, not a single tx fail due to Tor: Height: 2617599/2617599 (100.0%) on mainnet, not mining, net hash 2.92 GH/s, v14, 128(out)+79(in) connections, uptime 0d 5h 2m 36s
-
selsta
yep seems to be a bug or side effect from noise